Page 70 of 589 results (0.065 seconds)

CVSS: 5.0EPSS: 0%CPEs: 63EXPL: 1

The tempnam function in ext/standard/file.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass safe_mode restrictions, and create files in group-writable or world-writable directories, via the dir and prefix arguments. La función tempnam de ext/standard/file.c de PHP v5.2.11 y anteriores, y v5.3.x anteriores a v5.3.1, permite a usuarios dependiendo del contexto evitar las restricciones safe_mode, y crear ficheros en directorios con permisos de sistema operativo de escritura para su grupo o para cualquier usuario, a través de los argumentos dir y prefix. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://news.php.net/php.announce/79 http://secunia.com/advisories/37412 http://secunia.com/advisories/37821 http://secunia.com/advisories/40262 http://securityreason.com/securityalert/6601 http://support.apple.com/kb/HT4077 http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/standard/file.c?view=log http://svn.php.net/viewvc/p • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 1%CPEs: 62EXPL: 1

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file. La función posix_mkfifo de ext/posix/posix.c de PHP v5.2.11 y anteriores, y v5.3.x anteriores a la v5.3.1, permite a atacantes dependiendo del contexto evitar las restricciones open_basedir, y crear ficheros FIFO, a través de los argumentos "pathname" y "mode", como se ha demostrado creando un fichero .htaccess. • http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://news.php.net/php.announce/79 http://secunia.com/advisories/37412 http://secunia.com/advisories/37821 http://securityreason.com/securityalert/6600 http://support.apple.com/kb/HT4077 http://svn.php.net/viewvc/php/php-src/branches/PHP_5_2/ext/posix/posix.c?view=log http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/ext/posix/posix.c?view=log http://svn.php.net/viewvc?v • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

main/streams/plain_wrapper.c in PHP 5.3.x before 5.3.1 does not recognize the safe_mode_include_dir directive, which allows context-dependent attackers to have an unknown impact by triggering the failure of PHP scripts that perform include or require operations, as demonstrated by a script that attempts to perform a require_once on a file in a standard library directory. NOTE: a reliable third party reports that this is not a vulnerability, because it results in a more restrictive security policy. ** EN DISPUTA ** main / streams / plain_wrapper.c en PHP 5.3.x anterior a 5.3.1 no reconoce la directiva safe_mode_include_dir, que permite que los atacantes dependientes del contexto tengan un impacto desconocido al desencadenar la falla de los scripts PHP que incluyen incluir o requiere operaciones, como lo demuestra un script que intenta realizar un require_once en un archivo en un directorio de biblioteca estándar. NOTA: un tercero confiable informa que esto no es una vulnerabilidad, ya que resulta en una política de seguridad más restrictiva. • http://bugs.php.net/bug.php?id=50063 http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html http://news.php.net/php.announce/79 http://support.apple.com/kb/HT4077 http://www.mandriva.com/security/advisories?name=MDVSA-2009:302 http://www.openwall.com/lists/oss-security/2009/11/20/2 http://www.openwall.com/lists/oss-security/2009/11/20/3 http://www.openwall.com/lists/oss-security/2009/11/20/5 http://www.php.net/ChangeLog-5.php&# •

CVSS: 9.3EPSS: 1%CPEs: 13EXPL: 0

The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information. La función _gdGetColors en el archivo gd_gd.c en PHP versión 5.2.11 y versiones 5.3.x anteriores a 5.3.1, y GD Graphics Library versiones 2.x, no comprueba apropiadamente un determinado miembro de la estructura colorTotal, lo que podría permitir a los atacantes remotos conducir ataques de desbordamiento de búfer o de lectura excesiva de búfer por medio de un archivo GD especialmente diseñado, una vulnerabilidad diferente de CVE-2009-3293. NOTA: algunos de estos datos fueron obtenidos de la información de terceros. • http://marc.info/?l=oss-security&m=125562113503923&w=2 http://secunia.com/advisories/37069 http://secunia.com/advisories/37080 http://secunia.com/advisories/38055 http://svn.php.net/viewvc?view=revision&revision=289557 http://www.mandriva.com/security/advisories?name=MDVSA-2009:285 http://www.openwall.com/lists/oss-security/2009/11/20/5 http://www.redhat.com/support/errata/RHSA-2010-0003.html http://www.securityfocus.com/bid/36712 http://www.vupen.com/english/advis • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 109EXPL: 0

Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index." Vulnerabilidad sin especificar en la función imagecolortransparent de PHP en versiones anteriores a la v5.2.11 tiene un impacto desconocido y vectores de ataque relacionados con un incorrecto "sanity check for the color index." (comprobación de validez de un índice de color.). • http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://marc.info/?l=bugtraq&m=127680701405735&w=2 http://marc.info/?l=bugtraq&m=130497311408250&w=2 http://secunia.com/advisories/36791 http://secunia.com/advisories/40262 http://support.apple.com/kb/HT3937 http://www.osvdb.org/58187 http://www.php.net/ChangeLog-5.php#5.2.11 http://www.php.net/releases/5_2_11&# •